Skip to main content

Jeep hackers return to remotely hack Cherokee’s digital systems

Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
August 4, 2016 Read time: 2 mins
RSSJust a year after they caused 1958 Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse.

In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

At the Black Hat USA 2016 conference this week the two automotive cybersecurity researchers will outline new methods of cyber attack against the same Jeep Cherokee they hacked last year.

According to Miller and Valasek, hackers usually inject CAN messages on to the vehicle's network. However, there are often many limitations on what actions the vehicle can be forced to perform when injecting CAN messages. While an attacker may be able to easily change the speedometer while the car is driving, he may not be able to disable the brakes or turn the steering wheel unless the car he is driving meets certain prerequisites, such as travelling below a certain speed.

In their presentation, they plan to discuss how physical, safety critical systems react to injected CAN messages and how these systems are often resilient to this type of manipulation.

They will also outline new methods of CAN message injection which can bypass many of these restrictions and demonstrate the results on the braking, steering, and acceleration systems of an automobile. They end by suggesting ways these systems could be made even more robust in future vehicles.

Related Content

  • February 26, 2016
    Nissan disables Leaf app following hacking scare
    According to news reports, Nissan has disabled its NissanConnect EV app after it was found that hackers could remotely control in-car systems. Security researcher Troy Hunt discovered the vulnerability during a software workshop he was attending and has detailed his findings on his blog. In a test with fellow researcher Scott Helme, they found they were able to remotely turn on the car's heated seating, heated steering wheel, fans and air conditioning. According to Helmes, “Fortunately, the Nissan Le
  • May 16, 2022
    Commsignia stops AVs behaving badly
    Cybersecurity concerns surrounding autonomous vehicles create uncertainty but Commsignia has set out to win trust by combating ‘misbehaviour’ attacks, finds Ben Spencer
  • September 15, 2023
    Software is at heart of safe vehicle connectivity, says Qt Group
    Connected vehicle safety isn’t just under threat from malicious actors exploiting code – it’s also about avoiding software faults that could result in harm to people, says Patrick Shelly of Qt Group
  • July 31, 2012
    TRW announces next-gen pedestrian protection system
    TRW is announcing its next generation pedestrian protection system (PPS) - a robust and reliable system using a combination of acceleration and pressure sensing technologies to detect a pedestrian impact. "While the auto industry continues its focus on reducing injuries in single and multiple vehicle crashes and reductions in deaths and injuries have been realised in developed markets, pedestrian fatalities continue to increase globally," said Peter Lake, executive vice president of sales and business devel